Search results for: authorization
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 52

Search results for: authorization

52 Easily Memorable Strong Password Generation and Retrieval

Authors: Shatadru Das, Natarajan Vijayarangan

Abstract:

In this paper, a system and method for generating and recovering an authorization code has been designed and analyzed. The system creates an authorization code by accepting a base-sentence from a user. Based on the characters present in this base-sentence, the system computes a base-sentence matrix. The system also generates a plurality of patterns. The user can either select the pattern from the multiple patterns suggested by the system or can create his/her own pattern. The system then performs multiplications between the base-sentence matrix and the selected pattern matrix at different stages in the path forward, for obtaining a strong authorization code. In case the user forgets the base sentence, the system has a provision to manage and retrieve 'forgotten authorization code'. This is done by fragmenting the base sentence into different matrices and storing the fragmented matrices into a repository after computing matrix multiplication with a security question-answer approach and with a secret key provided by the user.

Keywords: easy authentication, key retrieval, memorable passwords, strong password generation

Procedia PDF Downloads 399
51 Securing Internet of Things Devices in Healthcare industry: An Investigation into Efficient and Effective Authorization Procedures

Authors: Maruf Farhan, Abdul Salih, Sikandar Ali Tahir

Abstract:

Protecting patient information's confidentiality is paramount considering the widespread use of Internet of Things (IoT) gadgets in medical settings. This study's subjects are decentralized identifiers (DIDs) and verifiable credentials (VCs) in conjunction with an OAuth-based authorization framework, as they are the key to protecting IoT healthcare devices. DIDs enable autonomous authentication and trust formation between IoT devices and other entities. To authorize users and enforce access controls based on verified claims, VCs offer a secure and adaptable solution. Through the proposed method, medical facilities can improve the privacy and security of their IoT devices while streamlining access control administration. A Smart pill dispenser in a hospital setting is used to illustrate the advantages of this method. The findings demonstrate the value of DIDs, VCs, and OAuth-based delegation in protecting the IoT devices. Improved processes for authorizing and controlling access to IoT devices are possible thanks to the research findings, which also help ensure patient confidentiality in the healthcare sector.

Keywords: Iot, DID, authorization, verifiable credentials

Procedia PDF Downloads 75
50 Central African Republic Government Recruitment Agency Based on Identity Management and Public Key Encryption

Authors: Koyangbo Guere Monguia Michel Alex Emmanuel

Abstract:

In e-government and especially recruitment, many researches have been conducted to build a trustworthy and reliable online or application system capable to process users or job applicant files. In this research (Government Recruitment Agency), cloud computing, identity management and public key encryption have been used to management domains, access control authorization mechanism and to secure data exchange between entities for reliable procedure of processing files.

Keywords: cloud computing network, identity management systems, public key encryption, access control and authorization

Procedia PDF Downloads 357
49 RAPDAC: Role Centric Attribute Based Policy Driven Access Control Model

Authors: Jamil Ahmed

Abstract:

Access control models aim to decide whether a user should be denied or granted access to the user‟s requested activity. Various access control models have been established and proposed. The most prominent of these models include role-based, attribute-based, policy based access control models as well as role-centric attribute based access control model. In this paper, a novel access control model is presented called “Role centric Attribute based Policy Driven Access Control (RAPDAC) model”. RAPDAC incorporates the concept of “policy” in the “role centric attribute based access control model”. It leverages the concept of "policy‟ by precisely combining the evaluation of conditions, attributes, permissions and roles in order to allow authorization access. This approach allows capturing the "access control policy‟ of a real time application in a well defined manner. RAPDAC model allows making access decision at much finer granularity as illustrated by the case study of a real time library information system.

Keywords: authorization, access control model, role based access control, attribute based access control

Procedia PDF Downloads 157
48 Violations of Press Freedom

Authors: Khalid Achaat

Abstract:

It is difficult to speak about freedom of the press in Algeria without first talking to fifty-seven journalists killed in the country between 1993 and 1997 and the five missing journalists. No serious investigation was conducted to find the culprits. When a State is not able to guarantee law, there is no justice and violations of the law become "systematic". How to claim the freedom of press in Algeria, when death becomes "banal"? In these circumstances, can we talk of rights of the Algerian press? It is impossible to understand the problems of the press in Algeria, focusing solely legal issues. Take into account technical, financial and political. Their respective roles varies depending on whether one focuses on the collection of information, the regime of the newspaper company or publication and dissemination. Can we say that the Algerian press is "the freest in the Arab world", while the latter reflects only partially the real problems facing the country? While any newspaper company is subject, de facto, to an authorization scheme, permanently subjected to the constant threat of withdrawal of the authorization, suspension, prohibition or closure without it has the right to a remedy? Can it be free when the majority of "media owners", head of the largest daily newspapers are derived from the single party in power since independence? Some of this release does not it serves the interests of the Algerian power?

Keywords: freedom, press, power, closure, suspension

Procedia PDF Downloads 350
47 Streamlining Cybersecurity Risk Assessment for Industrial Control and Automation Systems: Leveraging the National Institute of Standard and Technology’s Risk Management Framework (RMF) Using Model-Based System Engineering (MBSE)

Authors: Gampel Alexander, Mazzuchi Thomas, Sarkani Shahram

Abstract:

The cybersecurity landscape is constantly evolving, and organizations must adapt to the changing threat environment to protect their assets. The implementation of the NIST Risk Management Framework (RMF) has become critical in ensuring the security and safety of industrial control and automation systems. However, cybersecurity professionals are facing challenges in implementing RMF, leading to systems operating without authorization and being non-compliant with regulations. The current approach to RMF implementation based on business practices is limited and insufficient, leaving organizations vulnerable to cyberattacks resulting in the loss of personal consumer data and critical infrastructure details. To address these challenges, this research proposes a Model-Based Systems Engineering (MBSE) approach to implementing cybersecurity controls and assessing risk through the RMF process. The study emphasizes the need to shift to a modeling approach, which can streamline the RMF process and eliminate bloated structures that make it difficult to receive an Authorization-To-Operate (ATO). The study focuses on the practical application of MBSE in industrial control and automation systems to improve the security and safety of operations. It is concluded that MBSE can be used to solve the implementation challenges of the NIST RMF process and improve the security of industrial control and automation systems. The research suggests that MBSE provides a more effective and efficient method for implementing cybersecurity controls and assessing risk through the RMF process. The future work for this research involves exploring the broader applicability of MBSE in different industries and domains. The study suggests that the MBSE approach can be applied to other domains beyond industrial control and automation systems.

Keywords: authorization-to-operate (ATO), industrial control systems (ICS), model-based system’s engineering (MBSE), risk management framework (RMF)

Procedia PDF Downloads 92
46 Identity Management in Virtual Worlds Based on Biometrics Watermarking

Authors: S. Bader, N. Essoukri Ben Amara

Abstract:

With the technological development and rise of virtual worlds, these spaces are becoming more and more attractive for cybercriminals, hidden behind avatars and fictitious identities. Since access to these spaces is not restricted or controlled, some impostors take advantage of gaining unauthorized access and practicing cyber criminality. This paper proposes an identity management approach for securing access to virtual worlds. The major purpose of the suggested solution is to install a strong security mechanism to protect virtual identities represented by avatars. Thus, only legitimate users, through their corresponding avatars, are allowed to access the platform resources. Access is controlled by integrating an authentication process based on biometrics. In the request process for registration, a user fingerprint is enrolled and then encrypted into a watermark utilizing a cancelable and non-invertible algorithm for its protection. After a user personalizes their representative character, the biometric mark is embedded into the avatar through a watermarking procedure. The authenticity of the avatar identity is verified when it requests authorization for access. We have evaluated the proposed approach on a dataset of avatars from various virtual worlds, and we have registered promising performance results in terms of authentication accuracy, acceptation and rejection rates.

Keywords: identity management, security, biometrics authentication and authorization, avatar, virtual world

Procedia PDF Downloads 264
45 A Multiple Case Study of How Bilingual-Bicultural Teachers' Language Shame and Loss Affects Teaching English Language Learners

Authors: Lisa Winstead, Penny Congcong Wang

Abstract:

This two-year multiple case study of eight Spanish-English speaking teachers explores bilingual-bicultural Latino teachers’ lived experiences as English Language Learners and, more recently, as adult teachers who work with English Language Learners in mainstream schools. Research questions explored include: How do bilingual-bicultural teachers perceive their native language use and sense of self within society from childhood to adulthood? Correspondingly, what are bilingual teachers’ perceptions of how their own language learning experience might affect teaching students of similar linguistic and cultural backgrounds? This study took place in an urban area in the Pacific Southwest of the United States. Participants were K-8 teachers and enrolled in a Spanish-English bilingual authorization program. Data were collected from journals, focus group interviews, field notes, and class artifacts. Within case and cross-case analysis revealed that the participants were shamed about their language use as children which contributed to their primary language loss. They similarly reported how experiences of mainstream educator and administrator language shaming invalidated their ability to provide support for Latino heritage ELLs, despite their bilingual-bicultural expertise. However, participants reported that counter-narratives from the bilingual authorization program, parents, community and church organizations, and cultural responsive teachers were effective in promoting their language retention, pride, and feelings of well-being.

Keywords: teacher education, bilingual education, English language learners, emergent bilinguals, social justice, language shame, language loss, translanguaging

Procedia PDF Downloads 187
44 The Right to Family Reunification of Immigrants in Spain

Authors: María José Benitez Jimenez

Abstract:

This study seeks to make clear the importance of family reunification in order to establish consolidated habits of coexistence of immigrants, directly favoring the relationship of the family nucleus and indirectly the social integration of foreigners. In addition to the theoretical analysis of the subject, information has been reviewed by the National Institute of Statistics and Reports of Spanish organizations that compile data on immigrants and specifically on family reunification. The Spanish regulations on foreigners include the right of foreigners legally residing in Spain to regroup their families. The general conditions required to exercise this right are having legally resided in Spain for one year and having obtained authorization to reside for one more year. There are exceptions to the requirement of having resided for one year in our country. Article 39 of the Spanish Constitution, although it does not express what is to be understood as a family, does refer to the fact that ‘the public authorities ensure the social, economic and legal protection of the family’. Therefore for the Spanish State, the family institution, in a broad sense, enjoys a privileged treatment that is revealed in the Supreme Norm and that reflects the interest of our society to address the relationships that subjects have in their immediate environment. Although we are aware of the reluctant position of the Spanish Constitutional Court to consider as a fundamental right the right to family life despite being enshrined in Article 8 of the European Convention on Human Rights, it is questionable whether access to authorization for family reunification should be more uniform in terms of requirements related to nationality, employment or training of applicants in order to have an egalitarian character. The requirement of having resided one year in Spain to be able to request successful family reunification seems dispensable because if foreigners can obviate this requirement by having a certain status, its abolition would be feasible by equating all situations and benefiting foreigners in general. The achievement of this proposal would help to strengthen the family life of immigrants from the beginning of their life in Spain.

Keywords: family, immigrants, social integration, reunification

Procedia PDF Downloads 349
43 Evaluation of Adequacy of Caspofungin Prescription in a Tunisian Hospital Cohort

Authors: Mariem Meddeb Sidhom, Souhayel Hedfi, Rjaibia Houda, Mehdi Dridi, Mohamed Ali Yousfi, Sâadia Gargouri

Abstract:

Considering the important increase in costs of caspofungin treatments and ahead the evolution of its indication, pharmacy department was prompted to realize a review of the adequacy of prescriptions in the medical intensive care units (ICU). A retrospective observational study was conducted in Tunis military hospital concerning ICU prescriptions of caspofungin from 2008 until 2013. A pharmacist had returned to the patient’s medical records to collect data and to the microbiology department for parasitological results. The adequacy of prescriptions was evaluated by a pharmacist and an infectiologist parasitologist, referring to predefined scale of criteria resuming the indications of the marketing authorization (MA) and grade AI-AII of the guidelines of the Infectious Diseases Society of America (IDSA). Sixty two ICU patients have been treated with caspofungin during the period of study; however, 8 files were lost. Thus, 54 patients were included in the study having received 55 prescriptions of caspofungin. Males were a majority with 64.8% of the population. Mean age was 51 years. Caspofungin was indicated in accordance with the IDSA recommendations in 43.6% of the cases. The most case of non respect to the guidelines was the indication of caspofungin as empirical treatment in non neutropenic patients. Caspofungin was utilized as a first line treatment in 9 cases where it was possible to give fluconazole first, as germs were fluconazole- sensitive. Caspofungin was indicated in 2 patients with good renal function and in which nor amphotericin B, liposomal ampho B neither itraconazole had been previously used, as indicates the MA. The posology of caspofungin was respected in all prescriptions with a loading dose of 70 mg in the first day and a maintenance dose of 50 mg daily. Seven patients had received a daily dose of 70 mg, the recommended dose for people weighing more than 80 Kg. Caspofungin prescriptions are far to be adequately done. There is a clear need of optimization in indicating this molecule and that must be done in collaboration between the pharmacy department, the ICUs and parasitology department.

Keywords: caspofungin, prescription, intensive care units, marketing authorization, Tunisian hospital cohort

Procedia PDF Downloads 337
42 A Robust Implementation of a Building Resources Access Rights Management System

Authors: Eugen Neagoe, Victor Balanica

Abstract:

A Smart Building Controller (SBC) is a server software that offers secured access to a pool of building specific resources, executes monitoring tasks and performs automatic administration of a building, thus optimizing the exploitation cost and maximizing comfort. This paper brings to discussion the issues that arise with the secure exploitation of the SBC administered resources and proposes a technical solution to implement a robust secure access system based on roles, individual rights and privileges (special rights).

Keywords: smart building controller, software security, access rights, access authorization

Procedia PDF Downloads 438
41 Modulation of the Europay, MasterCard, and VisaCard Authentications by Using Avispa Tool

Authors: Ossama Al-Maliki

Abstract:

The Europay, MasterCard, and Visa (EMV) is the transaction protocol for most of the world and especially in Europe and the UK. EMV protocol consists of three main stages which are: card authentication, cardholder verification methods, and transaction authorization. This paper details in full the EMV card authentications. We have used AVISPA and SPAN tools to do our modulization for the EMV card authentications. The code for each type of the card authentication was written by using CAS+ language. The results showed that our modulations were successfully addressed all the steps of the EMV card authentications and the entire process of the EMV card authentication are secured. Also, our modulations were successfully addressed all the main goals behind the EMV card authentications according to the EMV specifications.

Keywords: EMV, card authentication, contactless card, SDA, DDA, CDA AVISPA

Procedia PDF Downloads 177
40 Evolution of Propiconazole and Tebuconazole Residues through the Post-Harvest Application in 'Angeleno' Plum

Authors: M. J. Rodríguez, F. M. Sánchez, B. Velardo, P. Calvo, M. J. Serradilla, J. Delgado, J. M. López

Abstract:

The main problems in storage and later transport of fruits, are the decays developed that reduce the quality on destination’s markets. Nowadays, there is an increasing interest in the use of compounds to avoid decays in post-harvest. Triazole fungicides are agrochemicals widely used in the agricultural industry due to their wide spectrum of actions, and in some case, they are used in citrus fruit post-harvest. Moreover, its use is not authorized in plum post-harvest, but in order to a future possible authorization, the evolutions of propiconazole and tebuconazole residues are studied after its post-harvest application in ‘Angeleno’ plum.

Keywords: maximum residue limit (MRL), triazole fungicides, decay, Prunus salicina

Procedia PDF Downloads 315
39 Quick Response(QR) Code for Vehicle Registration and Identification

Authors: S. Malarvizhi, S. Sadiq Basha, M. Santhosh Kumar, K. Saravanan, R. Sasikumar, R. Satheesh

Abstract:

This is a web based application which provides authorization for the vehicle identification and registration. It also provides mutual authentication between the police and users in order to avoid misusage. The QR code generation in this application overcomes the difficulty in the manual registration of the vehicle documents. This generated QR code is placed in the number plates of the vehicles. The QR code is scanned using the QR Reader installed in the smart devices. The police officials can check the vehicle details and file cases on accidents, theft and traffic rules violations using QR code. In addition to vehicle insurance payments and renewals, the renewal alert is sent to the vehicle owner about payment deadline. The non-permitted vehicles can be blocked in the next check-post by sending the alert messages.

Keywords: QR code, QR reader, registration, authentication, idenfication

Procedia PDF Downloads 493
38 Fast Authentication Using User Path Prediction in Wireless Broadband Networks

Authors: Gunasekaran Raja, Rajakumar Arul, Kottilingam Kottursamy, Ramkumar Jayaraman, Sathya Pavithra, Swaminathan Venkatraman

Abstract:

Wireless Interoperability for Microwave Access (WiMAX) utilizes the IEEE 802.1X mechanism for authentication. However, this mechanism incurs considerable delay during handoffs. This delay during handoffs results in service disruption which becomes a severe bottleneck. To overcome this delay, our article proposes a key caching mechanism based on user path prediction. If the user mobility follows that path, the user bypasses the normal IEEE 802.1X mechanism and establishes the necessary authentication keys directly. Through analytical and simulation modeling, we have proved that our mechanism effectively decreases the handoff delay thereby achieving fast authentication.

Keywords: authentication, authorization, and accounting (AAA), handoff, mobile, user path prediction (UPP) and user pattern

Procedia PDF Downloads 403
37 Authorization of Commercial Communication Satellite Grounds for Promoting Turkish Data Relay System

Authors: Celal Dudak, Aslı Utku, Burak Yağlioğlu

Abstract:

Uninterrupted and continuous satellite communication through the whole orbit time is becoming more indispensable every day. Data relay systems are developed and built for various high/low data rate information exchanges like TDRSS of USA and EDRSS of Europe. In these missions, a couple of task-dedicated communication satellites exist. In this regard, for Turkey a data relay system is attempted to be defined exchanging low data rate information (i.e. TTC) for Earth-observing LEO satellites appointing commercial GEO communication satellites all over the world. First, justification of this attempt is given, demonstrating duration enhancements in the link. Discussion of preference of RF communication is, also, given instead of laser communication. Then, preferred communication GEOs – including TURKSAT4A already belonging to Turkey- are given, together with the coverage enhancements through STK simulations and the corresponding link budget. Also, a block diagram of the communication system is given on the LEO satellite.

Keywords: communication, GEO satellite, data relay system, coverage

Procedia PDF Downloads 440
36 Signature Verification System for a Banking Business Process Management

Authors: A. Rahaf, S. Liyakathunsia

Abstract:

In today’s world, unprecedented operational pressure is faced by banks that test the efficiency, effectiveness, and agility of their business processes. In a typical banking process, a person’s authorization is usually based on his signature on most all of the transactions. Signature verification is considered as one of the highly significant information needed for any bank document processing. Banks usually use Signature Verification to authenticate the identity of individuals. In this paper, a business process model has been proposed in order to increase the quality of the verification process and to reduce time and needed resources. In order to understand the current process, a survey has been conducted and distributed among bank employees. After analyzing the survey, a process model has been created using Bizagi modeler which helps in simulating the process after assigning time and cost of it. The outcomes show that the automation of signature verification process is highly recommended for a banking business process.

Keywords: business process management, process modeling, quality, Signature Verification

Procedia PDF Downloads 422
35 An Attribute Based Access Control Model with POL Module for Dynamically Granting and Revoking Authorizations

Authors: Gang Liu, Huimin Song, Can Wang, Runnan Zhang, Lu Fang

Abstract:

Currently, resource sharing and system security are critical issues. This paper proposes a POL module composed of PRIV ILEGE attribute (PA), obligation and log which improves attribute based access control (ABAC) model in dynamically granting authorizations and revoking authorizations. The following describes the new model termed PABAC in terms of the POL module structure, attribute definitions, policy formulation and authorization architecture, which demonstrate the advantages of it. The POL module addresses the problems which are not predicted before and not described by access control policy. It can be one of the subject attributes or resource attributes according to the practical application, which enhances the flexibility of the model compared with ABAC. A scenario that illustrates how this model is applied to the real world is provided.

Keywords: access control, attribute based access control, granting authorizations, privilege, revoking authorizations, system security

Procedia PDF Downloads 358
34 Knowledge Based Automated Software Engineering Platform Used for the Development of Bulgarian E-Customs

Authors: Ivan Stanev, Maria Koleva

Abstract:

Described are challenges to the Bulgarian e-Customs (BeC) related to low level of interoperability and standardization, inefficient use of available infrastructure, lack of centralized identification and authorization, extremely low level of software process automation, and insufficient quality of data stored in official registers. The technical requirements for BeC are prepared with a focus on domain independent common platform, specialized customs and excise components, high scalability, flexibility, and reusability. The Knowledge Based Automated Software Engineering (KBASE) Common Platform for Automated Programming (CPAP) is selected as an instrument covering BeC requirements for standardization, programming automation, knowledge interpretation and cloud computing. BeC stage 3 results are presented and analyzed. BeC.S3 development trends are identified.

Keywords: service oriented architecture, cloud computing, knowledge based automated software engineering, common platform for automated programming, e-customs

Procedia PDF Downloads 369
33 The Importance of Affinity Groups for Organizations and Employees

Authors: Helio Arthur Reis Irigaray, Fabricio Stocker

Abstract:

This study aims to discover the extent to which affinity groups effectively act to combat inequalities, promote diversity, and contribute to the inclusion of non-hegemonic groups in the work environment. To this end, we have built empirical research, in which we interviewed 36 leaders and members of the collectives of non-hegemonic groups, namely women, blacks, and LGBTQ. With the proper authorization of the participants, their interviews were transcribed and submitted for critical analysis of the discourse. The field revealed that collectives are the result of the articulation of non-hegemonic groups, which create and participate in legitimate and institutional spaces to promote diversity. We also identified that diversity actions have happened as a market trend and reproduced mimetically. As the largest companies implement these actions, they become benchmarking and thus create a flow that is reproduced by other companies. However, there is no effective change in the structures that could promote inclusion and belonging. We state that a diverse group of employees are not enough to claim that the organization is diverse and inclusive. There remains much more to discuss and delve into deeply, including gender, diversity, and intersectionality.

Keywords: diversity, inclusion, collectives, affinity groups, employee resource groups

Procedia PDF Downloads 89
32 Performance Analysis of Elliptic Curve Cryptography Using Onion Routing to Enhance the Privacy and Anonymity in Grid Computing

Authors: H. Parveen Begam, M. A. Maluk Mohamed

Abstract:

Grid computing is an environment that allows sharing and coordinated use of diverse resources in dynamic, heterogeneous and distributed environment using Virtual Organization (VO). Security is a critical issue due to the open nature of the wireless channels in the grid computing which requires three fundamental services: authentication, authorization, and encryption. The privacy and anonymity are considered as an important factor while communicating over publicly spanned network like web. To ensure a high level of security we explored an extension of onion routing, which has been used with dynamic token exchange along with protection of privacy and anonymity of individual identity. To improve the performance of encrypting the layers, the elliptic curve cryptography is used. Compared to traditional cryptosystems like RSA (Rivest-Shamir-Adelman), ECC (Elliptic Curve Cryptosystem) offers equivalent security with smaller key sizes which result in faster computations, lower power consumption, as well as memory and bandwidth savings. This paper presents the estimation of the performance improvements of onion routing using ECC as well as the comparison graph between performance level of RSA and ECC.

Keywords: grid computing, privacy, anonymity, onion routing, ECC, RSA

Procedia PDF Downloads 396
31 A Progressive Techno-Legal Framework for Digital Evidence Management

Authors: Ayobami P. Olatunji, Saadat Ibiyeye, Abdulaziz Ibiyeye, Tahir M. Khan

Abstract:

Digital evidence has become a cornerstone in criminal investigations due to the vast amount of information available in digital form. Despite its prevalence, this evidence is often met with skepticism in court proceedings because of its inherently volatile nature. Traditional forensic processes, defined predominantly by technology experts, emphasize technical details in evidence collection while often neglecting legal procedures. This gap can pose significant challenges for legal practitioners in understanding and applying digital forensics. As digital evidence increasingly influences future cases, a cohesive framework integrating both technical and legal perspectives is essential. We propose a comprehensive techno-legal framework designed to bridge this gap. Our framework integrates key aspects of collection, preservation, examination, and documentation with legal components such as case building, certificate of compliance, cross-examination, and authorization. This balanced approach aims not to replace existing evidence presentation principles but to enhance the seamless integration of digital evidence into legal proceedings, addressing the common issues that lead to its dismissal.

Keywords: evidence presentation, warrant, digital-forensic, certificate of compliance, legal procedures, computer crime, violation, investigation cybercrime

Procedia PDF Downloads 30
30 IAM Smart – A Sustainable Way to Reduce Plastics in Organizations

Authors: Krithika Kumaragurubaran, Mannu Thareja

Abstract:

Saving our planet Earth is the responsibility of every human being. Global warming and carbon emissions are killing our planet. We must adopt sustainable practices to give our future generations an equal opportunity to enjoy this planet Earth, our home. One of the most used unsustainable materials is plastic. Plastics are used everywhere. They are cheap, durable, strong, waterproof, non-corrosive with a long life. So longthat it makes plastic unsustainable. With this paper, we want to bring awareness on the usage of plastic in the organizations and how to reduce it by adopting sustainable practices powered by technology. We have taken a case study on the usage of photo ID cards, which are commonly used for authentication and authorization. These ID cards are used by employees or visitors to get access to the restricted areas inside the office buildings. The scale of these plastic cards can be in thousands for a bigger organization. This paper proposes smart alternatives to Identity and Access Management (IAM) which could replace the traditional method of using plastic ID cards. Further, the proposed solution is secure with multi-factor authentication (MFA), cost effective as there is no need to manage the supply chain of ID cards, provides instant IAM with self-service, and has the convenience of smart phone. Smart IAM is not only user friendly however also environment friendly.

Keywords: sustainability, reduce plastic, IAM (Identity and Access Management), multi-factor authentication

Procedia PDF Downloads 108
29 Epidemiology of Primary Bronchopulmonary Cancer in Tunisia

Authors: Melliti Rihab, Zaeid Sonia, Khechine Wiem, Daldoul Amira

Abstract:

Introduction: Lung cancer is the leading cause of cancer death. Its incidence is increasing, and its prognosis remains pejorative. We present the clinical, pathological, and therapeutic characteristics of bronchopulmonary cancer (BPC) in Tunisia. Methods: Retrospective study including patients followed in the oncology department of the University Hospital of Monastir between April 2014 and December 2021 suffering from lung cancer. Results: These are 117 patients, including 86.3% men and 13.7% women (sex ratio 6.3). The average age was 64 years ± 9 (37-83), with 95.7% being over 50 years old. Patients were smokers in 82% of cases. The clinical signs were dominated by chest pain (27.5%) and dyspnea in 21.1% of cases. In 6 patients, an episode of COVID-19 infection revealed the diagnosis. Half of the patients had a PS between 0 and 1. Small cell lung cancer was present in 18 patients (15.4%). The majority of non small cell lung cancer was of the adenocarcinoma type (68.7%). The diagnosis was late (stage IV) in 62.4% of cases. BPC was metastatic to bone (52%), contralateral lung (25.9%), and brain (27.3%). Patients were oligometastatic in 26% of cases. Surgery and radiotherapy were performed respectively in 14.5% and 23.1% of cases. Three-quarters of the patients had had nutrition (75.2%). The ROS1 mutation was present in 1 patient. PDL-1 expression was >40% in 2 patients. Survival was mean eight months ± 7.4. Conclusion: Lung cancer is diagnosed at a late stage in Tunisia. The lack of molecular study for non-small cell PBC and the lack of marketing authorization for tyrosine kinase inhibitors in Tunisia make the management incomplete.

Keywords: SCLC, NCSLC, ROS1, PDL1

Procedia PDF Downloads 78
28 Consortium Blockchain-based Model for Data Management Applications in the Healthcare Sector

Authors: Teo Hao Jing, Shane Ho Ken Wae, Lee Jin Yu, Burra Venkata Durga Kumar

Abstract:

Current distributed healthcare systems face the challenge of interoperability of health data. Storing electronic health records (EHR) in local databases causes them to be fragmented. This problem is aggravated as patients visit multiple healthcare providers in their lifetime. Existing solutions are unable to solve this issue and have caused burdens to healthcare specialists and patients alike. Blockchain technology was found to be able to increase the interoperability of health data by implementing digital access rules, enabling uniformed patient identity, and providing data aggregation. Consortium blockchain was found to have high read throughputs, is more trustworthy, more secure against external disruptions and accommodates transactions without fees. Therefore, this paper proposes a blockchain-based model for data management applications. In this model, a consortium blockchain is implemented by using a delegated proof of stake (DPoS) as its consensus mechanism. This blockchain allows collaboration between users from different organizations such as hospitals and medical bureaus. Patients serve as the owner of their information, where users from other parties require authorization from the patient to view their information. Hospitals upload the hash value of patients’ generated data to the blockchain, whereas the encrypted information is stored in a distributed cloud storage.

Keywords: blockchain technology, data management applications, healthcare, interoperability, delegated proof of stake

Procedia PDF Downloads 137
27 Nurses' Knowledge and Attitudes about Clinical Governance

Authors: Sedigheh Salemi, Mahnaz Sanjari, Maryam Aalaa, Mohammad Mirzabeigi

Abstract:

Clinical governance is the framework within which the health service provider is required to ongoing accountability and improvement of the quality of their services. This cross-sectional study was conducted in 661 nurses who work in government hospitals from 35 hospitals of 9 provinces in Iran. The study was approved by the Nursing Council and was carried out with the authorization of the Research Ethics Committee. The questionnaire included 24 questions in which 4 questions focused on clinical governance defining from the nurses' perspective. The reliability was evaluated by Cronbach's alpha (α=0/83). Statistical analyzes were performed, using SPSS version 16. Approximately 40% of nurses correctly answered that clinical governance is not "system of punishment and rewards for the staff". The most nurses believed that "clinical efficacy" is one of the main components of clinical governance. A few of nurses correctly responded that "Evidence Based Practice" and "management" is not part of clinical governance. The small number of nurses correctly answered that the "maintenance of patient records" and "to recognize the adverse effects" is not the role of nurse in clinical governance. Most "do not know" answer was to the "maintenance of patient records". The most nurses unanimously believed that the implementation of clinical governance led to "promoting the quality of care". About a third of nurses correctly stated that the implementation of clinical governance will not lead to "an increase in salaries and benefits of the medical team". As a member of the health team, nurses are responsible in terms of participation in quality improvement and it is necessary to create an environment in which clinical care will flourish and serve to preserve the high standards.

Keywords: clinical governance, nurses, salary, health team

Procedia PDF Downloads 429
26 A Practice of Zero Trust Architecture in Financial Transactions

Authors: Liwen Wang, Yuting Chen, Tong Wu, Shaolei Hu

Abstract:

In order to enhance the security of critical financial infrastructure, this study carries out a transformation of the architecture of a financial trading terminal to a zero trust architecture (ZTA), constructs an active defense system for cybersecurity, improves the security level of trading services in the Internet environment, enhances the ability to prevent network attacks and unknown risks, and reduces the industry and security risks brought about by cybersecurity risks. This study introduces the SDP technology of ZTA, adapts and applies it to a financial trading terminal to achieve security optimization and fine-grained business grading control. The upgraded architecture of the trading terminal moves security protection forward to the user access layer, replaces VPN to optimize remote access, and significantly improves the security protection capability of Internet transactions. The study achieves 1. deep integration with the access control architecture of the transaction system; 2. no impact on the performance of terminals and gateways, and no perception of application system upgrades; 3. customized checklist and policy configuration; 4. introduction of industry-leading security technology such as single-packet authorization (SPA) and secondary authentication. This study carries out a successful application of ZTA in the field of financial trading and provides transformation ideas for other similar systems while improving the security level of financial transaction services in the Internet environment.

Keywords: zero trust, trading terminal, architecture, network security, cybersecurity

Procedia PDF Downloads 165
25 Post Covid-19 Landscape of Global Pharmaceutical Industry

Authors: Abu Zafor Sadek

Abstract:

Pharmaceuticals were one of the least impacted business sectors during the corona pandemic as they are the center point of Covid-19 fight. Emergency use authorization, unproven indication of some commonly used drugs, self-medication, research and production capacity of an individual country, capacity of producing vaccine by many countries, Active Pharmaceutical Ingredients (APIs) related uncertainty, information gap among manufacturer, practitioners and user, export restriction, duration of lock-down, lack of harmony in transportation, disruption in the regulatory approval process, sudden increased demand of hospital items and protective equipment, panic buying, difficulties in in-person product promotion, e-prescription, geo-politics and associated issues added a new dimension to this industry. Although the industry maintains a reasonable growth throughout Covid-19 days; however, it has been characterized by both long- and short-term effects. Short-term effects have already been visible to so many countries, especially those who are import-dependent and have limited research capacity. On the other hand, it will take a few more time to see the long-term effects. Nevertheless, supply chain disruption, changes in strategic planning, new communication model, squeezing of job opportunity, rapid digitalization are the major short-term effects, whereas long-term effects include a shift towards self-sufficiency, growth pattern changes of certain products, special attention towards clinical studies, automation in operations, the increased arena of ethical issues etc. Therefore, this qualitative and exploratory study identifies the post-covid-19 landscape of the global pharmaceutical industry.

Keywords: covid-19, pharmaceutical, businees, landscape

Procedia PDF Downloads 91
24 Effects of Carbon Black/Graphite Ratio for Electrical Conduction and Frictional Resistance of Nanocomposite Sol-Gel Coatings

Authors: Julien Acquadro, Sophie Noel, Frédéric Houze, Philippe Teste, Pascal Chretien, Clément Genet, Edouard Breniaux, Marie-Joël Menu, Florence Ansart, Marie Gressier

Abstract:

This paper presents the study results of the electrical and tribological properties of nanocomposite hybrid sol-gel coatings developed for industrial applications on electrical connector housings. The electrical properties of coatings are provided by conductive fillers. The coatings presented in this study are formulated with different types of conductive carbon fillers, in this case carbon black and graphite particles. The coatings are deposited on a high-phosphorous nickel substrate by a dip-coating process. The authors have investigated the effects of the carbon black/graphite ratio on the coating's electrical and tribological properties. Electrical characterizations with a 4-probe method and AFM measurements as well as tribological tests by micro-friction shed light on the role of the black carbon/graphite ratio on the final properties of the sol-gel nanocomposite coatings. This study shows that the amount of carbon black mainly drives the coatings' electrical conduction property, while graphite's lubrication properties bring interest to reduce the values of friction coefficients (at a contact pressure of 800 MPa). In the industrial field of electrical connectors, such coatings aim at replacing cadmium and chromium (VI) protection, as recommended by REACH (Registration, Evaluation and Authorization of Chemicals) and RoHS (Restriction of Hazardous Substances in electrical and electronic equipment) regulations (Annex XVII of REACH).

Keywords: carbon conductive fillers, electrical conduction, sol-gel coatings, tribology

Procedia PDF Downloads 87
23 The Factors Affecting on Promoting Productivity from Nurses' View

Authors: Mahnaz Sanjari, Sedigheh Salemi, Mohammad Mirzabeigi

Abstract:

Nowadays, the world is facing a crisis of workforce and one of the most striking examples is the shortage of nurses. Nursing workforce productivity is related by various factors such as absenteeism, professional effectiveness and quality care. This cross-sectional study was conducted in 700 nurses who work in government hospitals from 35 hospitals of 9 provinces in Iran. The study was approved by the Nursing Council and was carried out with the authorization of the Research Ethics Committee. The questionnaire included 33 questions and 4 sub categories such as human resource, education and management. The reliability was evaluated by Cronbach's alpha (α=0/85). Statistical analyzes were performed, using SPSS version 16. The result showed that nurses emphasized on "respect to nurse-to-bed ratio" and less importance item was "using less experienced nurse". In addition, another important factor in clinical productivity is "Proper physical structure and amenities","good communication with colleagues" and "having good facilities". Also, "human resources at all levels of standard", "promoting on merit" and "well defined relationship in health system" are another important factors in productivity from nurse` view. The main managerial factor is "justice between employees" and the main educational component of productivity is “updating nursing knowledge”. The results show that more than half of the participants emphasized on the management and educational factors. Productivity as one of the main part of the health care quality leads to appropriate use of human and organizational resources, reduce cost services, and organizational development.

Keywords: productivity, nursing services, workforce, cost services

Procedia PDF Downloads 343